In this article we look at using PowerShell maliciously while evading detection.